Fiber Technology: The Ajax Wired Revolution – Nation World News

las Ajax Innovations They have reached a new level. Unlike the technology of the 1980s that still exists in the security industry, our engineers have developed Fiber, a wired technology of the digital generation, fiber Combines cable reliability with freedom of radio connection, A simple four-core cable connected by fiber exhibits absolutely unusual characteristics.

until 2,000 meter connectivityCompatibility with all types of equipment, 60 hours of operation of a system consisting of 30 devices with a backup battery, advanced tamperingphotographic verification, instant notificationsHassle free installation and remote configuration via an app: Everything that was possible in Wireless Ajax is now available with cable and fiber.

Fiber technology at a glance

On a physical level, the fiber looks like a bus connection: the detectors are connected to a control panel with a four-core cable. However, the real revolution lies hidden at the software level. The fiber communication protocol inherits all the advantages of jeweler radio technology, Since it requires minimum power for bidirectional transmission of data packets. This feature provides more freedom while setting up the system as compared to analog and digital solutions available in the market.

A single fiber line can connect one or dozens of different detectors, sirens and keypads in any combination, The same goes for the MotionCam Fibro detectors. A separate cable is not required to receive photo verification. These broadcast over the same line used by system devices to communicate events. Devices are organized by rooms and groups in the Ajax application, regardless of their physical connection to the hub. This means that the security system has both a physical and a digital architecture.

las Multiple fiber lanes allow cable to be routed in a convenient and safe route And then adjust the systems digital architecture in the PRO app. With this flexibility and a margin length of 2km, it doesnt matter whether youre protecting a multi-storey building or multiple buildings, no need to complicate your system with additional signal amplifiers or power supplies Is.

The acceptable length of fiber line as compared to the average length of cables available in the market.

Fiber communication protocol logic ensures shock protection: even 30 detectors connected to a line will communicate stably when triggered simultaneously. Alarms are broadcast in less than 0.15 seconds.

thanks for the fiber Detectors consume tens of microamps, 100 times less than the market average for wired digital detectors, This low power consumption allows you to connect more devices to one line and enables longer cable connections. It is because of the logic of the protocol that the major characteristics of the jeweler are inherited.

Fiber communication is conducted according to TDMA principle. Each device is assigned a small time slot to exchange data with the hub. The rest of the time, your communication modules are inactive. This significantly reduces power consumption and helps prevent interference even when multiple devices are communicating simultaneously.

These time slots are arranged so that alarms are broadcast immediately. If the detector does not respond, the hub repeats the request twice and then notifies users and the security company about the loss of the device.

The result is exceptional autonomy of the system in case of blackouts. 30 wired Fibra devices with up to 60 hours of 7 Ah backup battery, This is 5 times higher than that required for Grade 2, and meets the requirements of Grade 3.

What are degrees and why is it so important for a security system to have them?

For protect transmitted datauses fiber dynamic key encryption, Hacking and getting the data would require huge computing power and time. In other words, it would be a futile effort. However, encrypted data must also be accessed. Each communication session between the hub and the device begins with authentication: Bookmarks and unique properties are compared. If at least one parameter fails validation, the hub device ignores commands. Therefore, there is no point in manipulating or intercepting the data.

An Ajax security system constantly monitoring your status: The hub automatically determines the connected device as many times as possible by the system. If the detector does not respond, a notification will be sent in 36 seconds, The tension of each instrument is controlled. If the line is damaged and lightning starts, a notification will also be sent. The system immediately detects a short circuit on the line and notifies the monitoring station and users. And when the problem is resolved, there is no need to replace the fuses, as the system automatically restores its operation.

In addition, the next update of OS Malevich will allow the Fibra line to be physically protected so that it does not break. To do this, connect the beginning of the line to one hub terminal and its end to the other. This connection forms a ring topology. In the event of a line failure, Ring is split into two work segments, a security company and users are notified of the incident.

Supports fiber ring connection topology. Systems with hub hybrids can have up to 4 rings.

Fibra has completely inherited the Ajax wireless user experience. App notifications contain comprehensive information: the Event type, date, time, detector name and room, Thanks to the addressability of the devices, it is known what is happening in the system and installation, even if a dozen detectors are connected to a line. Add to this the photographic verification of the MotionCam motion detector, and you can have the most of system information and control at your fingertips.

To simplify the installation of fiber-containing equipment, special software tools have been developed. The Line Scan function automatically finds devices not assigned to the Hub and allows them to be added to the system, with just a few taps.

Fiber line scanning interface in Ajax Pro application.

Built-in maximum load testing on power consumption helps to ensure that the system has enough power in any given scenario. After setting up the system, the installer uses the PRO app to simulate the maximum possible energy consumption: detectors sound an alarm, keypads activate and sirens turn on. If the system passes the test, it will have enough power in any case.

If you a. make use of Integrated Pro desktop application for monitoring Ajax systems, The list of convenient features is complemented by automatic system synchronization. After the installation and configuration process, all Ajax Team configurations are automatically downloaded from the cloud servers. The control station engineer wastes no time manually moving the equipment, eliminating mechanical errors.

Fiber is synonymous with flexibility, reliability and control, As part of the Ajax ecosystem, new wired technology makes it possible to have a stable user experience regardless of the connection between devices and the hub. Efficient hardware and sophisticated software laid the foundation for the development of another Ajax product line that set a new standard in the security industry.

Read the original post:
Fiber Technology: The Ajax Wired Revolution - Nation World News

Related Posts

Comments are closed.